Analysis
-
max time kernel
3149806s -
max time network
133s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
27-11-2022 06:47
Static task
static1
Behavioral task
behavioral1
Sample
4869cde58d6a11e5ad8b7e2af2a98363cb8d99c5afbf49943b9bb3283ac63e06.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
4869cde58d6a11e5ad8b7e2af2a98363cb8d99c5afbf49943b9bb3283ac63e06.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
4869cde58d6a11e5ad8b7e2af2a98363cb8d99c5afbf49943b9bb3283ac63e06.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
4869cde58d6a11e5ad8b7e2af2a98363cb8d99c5afbf49943b9bb3283ac63e06.apk
-
Size
903KB
-
MD5
13a26c6b13b78f66f38065920a0ecd81
-
SHA1
bc9da351e6d283dd52141099af88724a97ffa1e2
-
SHA256
4869cde58d6a11e5ad8b7e2af2a98363cb8d99c5afbf49943b9bb3283ac63e06
-
SHA512
31457bb9063aa2b5ff933ac11c772780a7652f42a5321d3829d27c5b2a62cba369d166c449ea7cf955e6ee42d1933cc4133c45d6b650ed668472e76fe7b8476f
-
SSDEEP
24576:TJmxTAZNIPviy2ukqyw7b1i1NCV3fTjUZJvqo:tmxTArMeukqt7b1ifATjUDvH
Malware Config
Signatures
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
cn.cq.yb20150407description ioc process Framework API call javax.crypto.Cipher.doFinal cn.cq.yb20150407
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/cn.cq.yb20150407/databases/cn.cq.yzFilesize
32KB
MD52126e5a70fb48e951bc40d707436cfae
SHA104d71d4988756e38a0ea6b0f4dad6896917038d5
SHA2566b6c580bbe167dfaf7e26e6e062ec46286a4874ed816d59bf4bf79b07f29ffef
SHA51238d24329e7ba27bd0c9597207213de716989663e405a21be61f2c4254e4db9b1dfef30017357171710f00f2d25f81cca2c5f3546a132b448faf45e51cc87da7d
-
/data/user/0/cn.cq.yb20150407/databases/cn.cq.yz-journalFilesize
524B
MD584db352eacac8c0e6a4dc422df4caa16
SHA16f7eccaea074e16608ddae7ef1185271f0a304dc
SHA2560738f51231448bb57e365cfa100ae42461901c92f4838e3fb748f669d9893edd
SHA512011d4515298fbd226fc7bc13dc053e7a983a745d292c799531be5fe2733d004ce463432595d08a79f7d8a556bb69fd6c3e6de85a8f3d10eac604c58d8a0373d7
-
/data/user/0/cn.cq.yb20150407/databases/cn.cq.yz-shmFilesize
8B
MD57dea362b3fac8e00956a4952a3d4f474
SHA105fe405753166f125559e7c9ac558654f107c7e9
SHA256af5570f5a1810b7af78caf4bc70a660f0df51e42baf91d4de5b2328de0e83dfc
SHA5121b7409ccf0d5a34d3a77eaabfa9fe27427655be9297127ee9522aa1bf4046d4f945983678169cb1a7348edcac47ef0d9e2c924130e5bcc5f0d94937852c42f1b
-
/data/user/0/cn.cq.yb20150407/databases/cn.cq.yz-walFilesize
40KB
MD5fb6d5c595eccd87b93b4578f43b93f75
SHA1fb616ab3d4ae77789e1e841e5f5d9e60cdd5006c
SHA256e8f2de265471a9461f61975e3b11910cb23bd5cdb0e870e679cb0071305f8d3a
SHA5121c0ef42f8ae0a99fcd2122872a51163381c79789c8bc1356c2118aa4b490a33717be16714eaae93c8930ddf7e7e79f7b356cc1804d87b1b43dca9a573ad4443f
-
/storage/emulated/0/Download/P.apkMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/storage/emulated/0/Download/P.apkMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e